• Title/Summary/Keyword: Channel management

Search Result 1,335, Processing Time 0.026 seconds

Determinants and pattern of entrepreneurial failure (창업실패 요인 분류 및 실패 패턴 분석)

  • Shin, Joong Kyung;Ha, Kyu Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.257-265
    • /
    • 2013
  • Research about business failure was focused on finding the reason of bankruptcy. This research tries to analyze reason and pattern of entrepreneurial failure. Based on 20 entrepreneurial failure cases, we figure out the reason of entrepreneurial failure, utilizing liability of newness and ERIS model. We find that start-up firms in Korea have liability of newness, such as lack of managerial capability, failure of R&D/commercialization, and difficulty of securing marketing channel. Also, we typologize 4 kind of entrepreneurial failure - Lack of preparation of business, failure of resource mobilization, absence of strategy, and failure of marketing.

A Study on Integration and Application Plans of Address and Location Information (주소정보와 위치정보의 통합 및 활용 방안 연구)

  • Chang, Tai-Woo
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.2
    • /
    • pp.93-105
    • /
    • 2010
  • Address and location information is gaining importance as a channel between business entities and customers. However, as the new address scheme, which is based on street name and building number, is deployed, various problems occurred in the areas of postal service, logistics and management of customer information. And therefore it is necessary to make plans for integration and application of address information and location information. In this study, we clearly identify the problems when the governments and companies manage the address and location information under the circumstances of new address system. And we suggest improvement plans from the viewpoint of code scheme and database linkage.

2D numerical modeling of icebreaker advancing in ice-covered water

  • Sawamura, Junji
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.10 no.3
    • /
    • pp.385-392
    • /
    • 2018
  • This paper presents 2D numerical modeling to calculate ship-ice interactions that occur when an icebreaker advances into ice-covered water. The numerical model calculates repeated icebreaking of an ice plate and removal of small ice floes. The icebreaking of the ice plate is calculated using a ship-ice contact detection technique and fluid-structural interaction of ice plate bending behavior. The ship-ice interactions in small ice floes are calculated using a physically based modeling with 3DOF rigid body equations. The ice plate is broken in crushing, bending, and splitting mode. The ice floes drift by wind or current and by the force induced by the ship-ice interaction. The time history of ice force and ice floe distribution when an icebreaker advances into the ice-covered water are obtained numerically. Numerical results demonstrate that the time history of ice force and distribution of ice floes (ice channel width) depend on the ice floe size, ship motion and ice drifting by wind or current. It is shown that the numerical model of ship maneuvering in realistic ice conditions is necessary to obtain precise information about the ship in ice-covered water. The proposed numerical model can be useful to provide data of a ship operating in ice-covered water.

Analysis and Elimination of Side Channels during Duplicate Identification in Remote Data Outsourcing (원격 저장소 데이터 아웃소싱에서 발생하는 중복 식별 과정에서의 부채널 분석 및 제거)

  • Koo, Dongyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.981-987
    • /
    • 2017
  • Proliferation of cloud computing services brings about reduction of the maintenance and management costs by allowing data to be outsourced to a dedicated third-party remote storage. At the same time, the majority of storage service providers have adopted a data deduplication technique for efficient utilization of storage resources. When a hash tree is employed for duplicate identification as part of deduplication process, size information of the attested data and partial information about the tree can be deduced from eavesdropping. To mitigate such side channels, in this paper, a new duplicate identification method is presented by exploiting a multi-set hash function.

Location Awareness Method using Vector Matching of RSSI in Low-Rate WPAN (저속 WPAN에서 수신신호세기의 Vector Matching을 이용한 위치 인식 방식)

  • Nam Yoon-Seok;Choi Eun-Chang;Huh Jae-Doo
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.93-104
    • /
    • 2005
  • Recently, RFID/USN is one of fundamental technologies in information and communications networks. Low-Rate WPAN, IEEE802.15.4 is a low-cost communication network that allows wireless connectivity in applications with limited Power and relaxed throughput requirements. Its applications are building automation, personal healthcare, industrial control, consumer electronics, and so on. Some applications require location information. Of course location awareness is useful to improve usability of data Low-Rate WPAN Is regarded as a key specification of the sensor network with the characteristics of wireless communication, computing, energy scavenging, self-networking, and etc. Unfortunately ZigBee alliance propose a lot of applications based on location aware technologies, but the specification and low-rate WPAN devices don't support anything about location-based services. RSSI ( Received Signal Strength indication) is for energy detection to associate, channel selection, and etc. RSSI is used to find the location of a potable device in WLAN. In this paper we studied indoor location awareness using vector matching of RSSI in low-Rate wireless PAN. We analyzed the characteristics of RSSI according to distance and experimented location awareness. We implemented sensor nodes with different shapes and configured the sensor network for the location awareness with 4 fixed nodes and a mobile node. We try to contribute developing location awareness method using RSSI in 3-dimension space.

  • PDF

A Study on Complication factors between foreign and domestic chefs (국내외 조리시간의 갈등요인에 관한 연구)

  • 최수근;조우제
    • Culinary science and hospitality research
    • /
    • v.6 no.3
    • /
    • pp.99-118
    • /
    • 2000
  • This study attempts to identify the level of conflicts occurring between foreign and domestic chefs, and to suggest the way of controlling those conflicts in order to well manage human resources, foreign chefs. Based on the empirical research, the research findings shows that in terms of targeting and achieving objectives different level of conflicts are experienced when age, hotel type, position varies. For example. purchasing excessive foreign foods may cause undesirable stock which will lead to considerable loss. In order to overcome this problem the advantages of the chain-operated and the independent hotel's food purchasing system must be incorporated. Secondly, another conflicts arise when the architecture and system of a kitchen is different from what foreign chefs are familiar with. Kitchen architecture and system should be well-designed in terms of delivery channel, sanitation, safety, food control, banquet etc.. In developing menu, chefs often have different criteria in the scale of sweet and salt of a particular dish. Foreign chefs often blame his subordinates for not meeting his requirements without proper training or education. Finally, because of the different culture, communication as well as the lack of mutual understanding problem occur. Even though today is called global town. some chefs do not seem to open their minds to learn other developing countries' culture. In diversity management aspect, chefs need to put much effort to be aware of other countries' culture, history, political and economic situation. In prior to employing foreign chefs, the job enrollment and description must be prepared so as to minimize the conflicts, which otherwise will create poor job performance.

  • PDF

A Case Study of the Hindrance Factors of Open Innovation in Korean Large-Scale Companies Focused on WFGM Model (국내 대기업의 개방형 혁신 저해요인에 대한 WFGM 관점 분석 사례)

  • Cho, Yo-Han;Ryu, Christopher J.;Lim, Gyoo-Gun;Lee, Dae-Chul
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.2
    • /
    • pp.249-263
    • /
    • 2012
  • Recently the open innovation is considered as one of the important issues for the survival strategy of a company in the industry. There have been several researches and practices on this topic. However, previous researches are mainly focused on the study of successful cases and some statistical analyses on the relationship between the open innovation and its performance. There are rare researches on the hindrance factors in the practical level. This paper tries to find some hinderance factors for the open innovation in Korean large-scale companies based on the WFGM(Want-Find-Get-Manage) model proposed by Gene Slowinski(2006). Especially this research focused on each processes of open innovation by in-depth interviews for two representative large companies in Korea. From the result of this research we come to know that the critical hindrance factor in the WANT step is the uncertain definition of the necessary technologies for the company. Issues on establishing and maintaining the innovation network are in the FIND step. Technology evaluation, technology introduction channel and technology copying issues are in the GET step. Communication issues, technology feasibility and lack of competition are in the MANAGE step. This paper finds some hindrance factors in each process step of open innovation, which gives some implications for the companies that want to adopt open innovation.

Two-Dimensional River Flow Analysis Modeling By Finite Element Method (유한요소법에 의한 2차원 하천 흐름 모형의 개발)

  • Han, Kun-Yeun;Kim, Sang-Ho;Kim, Byung-Hyun;Choi, Seung-Yong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.425-429
    • /
    • 2006
  • The understanding and prediction of the behavior of flow in open channels are important to the solution of a wide variety of practical flow problems in water resources engineering. Recently, frequent drought has increased the necessity of an effective water resources control and management of river flows for reserving instream flow. The objective of this study is to develop an efficient and accurate finite element model based on Streamline Upwind/Petrov-Galerkin(SU/PG) scheme for analyzing and predicting two dimensional flow features in complex natural rivers. Several tests were performed in developed all elements(4-Node, 6-Node, 8-Node elements) for the purpose of validation and verification of the developed model. The U-shaped channel of flow and natural river of flow were performed for tests. The results were compared with these of laboratory experiments and RMA-2 model. Such results showed that solutions of high order elements were better accurate and improved than those of linear elements. Also, the suggested model displayed reasonable velocity distribution compare to RMA-2 model in meandering domain for application of natural river flow. Accordingly, the developed finite element model is feasible and produces reliable results for simulation of two dimensional natural river flow. Also, One contribution of this study is to present that results can lead to significant gain in analyzing the accurate flow behavior associated with hydraulic structure such as weir and water intake station and flow of chute and pool.

  • PDF

Preliminary Design of Electronic System for the Optical Payload

  • Kong Jong-Pil;Heo Haeng-Pal;Kim YoungSun;Park Jong-Euk;Chang Young-Jun
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.637-640
    • /
    • 2005
  • In the development of a electronic system for a optical payload comprising mainly EOS(Electro-Optical Sub-system) and PDTS(Payload Data Transmission Sub-system), many aspects should be investigated and discussed for the easy implementation, for th e higher reliability of operation and for the effective ness in cost, size and weight as well as for the secure interface with components of a satellite bus, etc. As important aspects the interfaces between a satellite bus and a payload, and some design features of the CEU(Camera Electronics Unit) inside the payload are described in this paper. Interfaces between a satellite bus and a payload depend considerably on whether t he payload carries the PMU(Payload Management Un it), which functions as main controller of the Payload, or not. With the PMU inside the payload, EOS and PDTS control is performed through the PMU keep ing the least interfaces of control signals and primary power lines, while the EOS and PDTS control is performed directly by the satellite bus components using relatively many control signals when no PMU exists inside the payload. For the CEU design the output channel configurations of panchromatic and multi-spectral bands including the video image data inter face between EOS and PDTS are described conceptually. The timing information control which is also important and necessary to interpret the received image data is described.

  • PDF

Optimal Channel Modeling for Multicasting in VOD (VOD에서 멀티캐스팅을 위한 최적 채널 모델링)

  • Kim, Hyoung-Joong;Yeo, In-Kwon;Jitendra K. Manandhar
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.8
    • /
    • pp.623-628
    • /
    • 2000
  • Video-on-demand system in which users can request any video through the network at any time is made possible by rapid increase in network bandwidth and capacity of the media server. However true video-on-demand system cannot support all requests since bandwidth requirement is still too demanding. Therefore efficient bandwidth reduction algorithm is necessary. both the piggybacking method and the batching method are novel solutions that can provide more logical number of streams than the physical system can support. Of course each of them has its pros and cons. hence piggybacking with batching-by-size can take advantage of both the schemes. Some parameters such as the size of batch and the size of the catch-up window should be adjusted and order to maximize the bandwidth reduction for piggybacking with batching-by-size method. One of the most important parameters is decided optimally in this paper. Simulation shows that the optimized parameter can achieve considerable reductionand consequently remarkable enhancement in performance.

  • PDF